header-logo
Suggest Exploit
vendor:
GOautodial 4.0
by:
Balzabu
7.5
CVSS
HIGH
Authenticated Shell Upload
434
CWE
Product Name: GOautodial 4.0
Affected Version From: 4.0
Affected Version To: 4.0
Patch Exists: N/A
Related CWE: N/A
CPE: goautodial:goautodial_4.0
Metasploit: N/A
Other Scripts: N/A
Platforms Tested: CentOS 7
2020

GOautodial 4.0 – Authenticated Shell Upload

GOautodial 4.0 is vulnerable to an authenticated shell upload vulnerability. An attacker can log in as an agent, write a new message to user goadmin with a random subject and text, attach a webshell to the message, and access the shell at https://www.foo.com/uploads/year/month/shellname.php. This allows the attacker to gain privileged access to the system.

Mitigation:

Ensure that user input is properly validated and sanitized to prevent malicious file uploads.
Source

Exploit-DB raw data:

# Exploit Title: GOautodial 4.0 - Authenticated Shell Upload
# Author: Balzabu
# Discovery Date: 07-23-2020
# Vendor Homepage: https://goautodial.org/
# Software Link: https://goautodial.org/GOautodial-4-x86_64-Final-20191010-0150.iso.html
# Tested Version: 4.0 (Last relase as of today)
# Tested on OS: CentOS 7

# STEPS TO REPRODUCE:

1 - Log in as an agent
2 - Write a new message to user goadmin with random subject and text
3 - Attach your webshell to the message
4 - Access your shell at 
https://www.foo.com/uploads/year/month/shellname.php ( Example: 
https://XXX.XXX.XXX.XXX/uploads/2020/07/shell.php )
5 - Priv esc and enjoy ... :-)